Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 17:55
Static task
static1
Behavioral task
behavioral1
Sample
84fa643491d3516045917565e13f38ea_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
84fa643491d3516045917565e13f38ea_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
84fa643491d3516045917565e13f38ea_JaffaCakes118.html
-
Size
27KB
-
MD5
84fa643491d3516045917565e13f38ea
-
SHA1
dc0798f374bae62cd3c29cfb64b663cb9160da32
-
SHA256
e353a5ee7b4c3cb0e5def13e2cf6a461a7d8f194645cc865bafc7b13825950e3
-
SHA512
6f0478ba0d71e95ed97c52783f4155de9502db9d376fab3af22b97bdae402e63c6f95353b50a08096edfc92c81a527f22b1a920744fd1878e39ccd75a7f6ab6e
-
SSDEEP
192:uwbMb5nkunQjxn5Q/vnQieeNnHnQOkEntlpnQTbnJnQ9ek+m6MhqkQl7MB+qnYnl:BQ/hV22qPSoP
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423253607" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D332A5B1-1EAD-11EF-A4DC-6EC9990C2B7A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 3020 2204 iexplore.exe 28 PID 2204 wrote to memory of 3020 2204 iexplore.exe 28 PID 2204 wrote to memory of 3020 2204 iexplore.exe 28 PID 2204 wrote to memory of 3020 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84fa643491d3516045917565e13f38ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5982cce3ccfd2dddc185c17a9295faa41
SHA11721d9ae1f5d31c4dfddacb136b40e33c8a82d12
SHA256734c0d0cb9b61b0ce020eba2c9b621048244d1e13ba5abf47d08513c380c7e6c
SHA512bef91eca349b9c973b31d2a90fc4641a6895590c880071ab5af6f879cff5b393d3079d9ce7a3ff79e24c25bd702035263d1d0df195d2c5e7be8af1112bc4fe21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f6d280e36a9741d2b2a1a562234ae5a
SHA101e76e40ffafb2292c81d6b5d044b474c8615920
SHA2569512a741a8d108287ae935fd04c855958939027b264d44d0a38b21fd3ea2db17
SHA512a0671dd344fb68869e764a59d041f88d33e70b5d61d19294e21ca69c736b55bd4f902006d189e2daca7b623cbfcfe0e0ae66baec52207d2f34e67e9884c9eeae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c00ae4ac47ce6584987f29f6e4cc3ece
SHA18b053a4bd482ea42007b05b68730065bb1964a97
SHA2565e62235eadae87f15eb1f868f6cde9e31cece0be6b24c27c51ad4af28791d153
SHA512883495bca843c95323fb3d52dabfd3d6a85182cdd1f3592914dac3a1bdd52d3aea5cdc236a5f77ce5637f97e0a32eade923a04823579b5681088a8a1b4189d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a34b9e03183aa06a527b1443045e613
SHA1e4c1c23b2fc9fde5a529798bac19bea6e33f3b54
SHA256c5b3d61d704282e0fb86a41ed6f8a55d47707f43673989228b3ef1e7348b0092
SHA512e94de174da5583390371939022c99f2d2970c08bfd26278e98889aacb39d7d60df7b3426a67e007e6ffc38d24b0490718300f077814ebb19083ac0c61a0f9007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a121382cdd5848e8a98ac9b613c8a227
SHA1a9eb52dd6082b0d62f6ca834152b55a5cdeb8e6e
SHA2563f716dbdecaf579f3811ff82b82e85dbbecc767aa9e0a6d424832b8a9eb19be8
SHA512993db510f9f8bbbce56184a7df10afddb3fc826837d966dcb7c44536283fef4bde72021893d04a5967b200f757ce22b6bd645ceb843154db8deef9f2e79cafbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a80f4f91926ee9e2c1e04b5e41920a
SHA19870e31b53d2bb76dc4dce96ffc514ea35457b0b
SHA256c1da21cc037f7493089a1709c1e0cdad8233abbb4a0471a77e2cc16f2a8d6db6
SHA512c5d3f4529ccc92891eb1884ce87c6725459135ca136437fa88d361ed1b290186bd52fbd36f1b01a2d6dda9bb56b5dadf151012d294134a463daa0e15ac4aa044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b23f60f7824845ed497bfdbfec884a4d
SHA1def6a0a6a66f0129b7543cedd67f1de21b02f466
SHA256899bf2dc1e32324efb4da5f6b726e544ff272794dcd94304c3535ebe635979cb
SHA512abc69ee0a5336de4a6e8ed7ae040f498fee2bb77dffca625376298c0a1c22ab5f3975056cd54e7a4ecc8bfd900d56db3e56968a2adbee8dd5937335ceabeba54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5ca1237c031b15444a47dfabfa98918
SHA1837bab5fc78bcfe22be4c026c534647f0323d6ae
SHA2568126923158aab5d24ef788ad39eaf1a04615c74042d543db024d3dd50fe52d39
SHA5126a90e150c83aa5f180ab58a1ade21594348fed0203972e2fbdf7405101e57cad4813762c0ce6852ac2ca01717813a544e9c34719905d613e4dfcbc7af724ce72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503665f5af5fe00b5d84cb3c2846c4f34
SHA170610475afd5d86bb4e3b5abb3abc83499dba632
SHA256f69235fbb6639f3d06f7feab7623dd10e663645856259e4d5c1c02d67c72cd18
SHA5122e4c26e20d70714050834e9d047322a2c6f3915dd645745623a648e1e15259961242de30ad57b50f600c5970a611e02149a41bd95e0cf5cf136c7f1319dbe2bb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b